MCC: Mitigating colluding collision attacks in wireless sensor networks

Issa Khalil

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)

    Abstract

    Stealthy packet dropping in multihop wireless sensor networks can be realized by the colluding collision attack. Colluding collision attack disrupts a packet from reaching its destination by malicious collusion at intermediate nodes. Moreover, the malicious nodes give the impression to their neighbors that they performed the legitimate forwarding action. Therefore, a legitimate node comes under suspicion. We provide a protocol called MCC to remedy the attack. MCC builds forwarding counters at each neighbor of the suspicious node and collaboratively compare the values of these counters to detect any discrepancy that could be caused by malicious packet dropping. We show through analysis and simulation that the basic local monitoring (BLM) fails to efficiently mitigate stealthy colluding collision attacks while MCC successfully mitigates them.

    Original languageEnglish
    Title of host publication2010 IEEE Global Telecommunications Conference, GLOBECOM 2010
    PublisherInstitute of Electrical and Electronics Engineers Inc.
    ISBN (Print)9781424456383
    DOIs
    Publication statusPublished - 2010
    Event53rd IEEE Global Communications Conference, GLOBECOM 2010 - Miami, FL, United States
    Duration: Dec 6 2010Dec 10 2010

    Publication series

    NameGLOBECOM - IEEE Global Telecommunications Conference

    Other

    Other53rd IEEE Global Communications Conference, GLOBECOM 2010
    Country/TerritoryUnited States
    CityMiami, FL
    Period12/6/1012/10/10

    Keywords

    • Colluding collision
    • Local monitoring
    • Malicious node
    • Multi-hop wireless networks
    • Packet dropping

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'MCC: Mitigating colluding collision attacks in wireless sensor networks'. Together they form a unique fingerprint.

    Cite this